• Title, Summary, Keyword: Physical threats

Search Result 119, Processing Time 0.029 seconds

Problem Analysis and Countermeasures Research through Security Threat Cases of Physical Security Control Systems (물리보안 관제시스템의 보안위협 사례를 통한 취약점 분석 및 대응방안 연구)

  • Ko, Yun Seong;Park, Kwang Hyuk;Kim, Chang Soo
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.1
    • /
    • pp.51-59
    • /
    • 2016
  • Physical security protecting people from physical threats, such as a person or vehicle, has received a great attention. However, it has many risks of hacking and other security threats because it is highly dependent on automated management systems. In addition, a representative system of physical security, a CCTV control system has a high risk of hacking, such as video interceptions or video modulation. So physical security needs urgent security measures in accordance with these threats. In this paper, we examine the case of security threats that have occurred in the past, prevent those from threatening the physical security, and analyze the security problem with the threats. Then we study the countermeasures to prevent these security threats based on the problems found in each case. Finally we study for the method to apply these countermeasures.

A Survey on Cyber Physical System Security for IoT: Issues, Challenges, Threats, Solutions

  • Kim, Nam Yong;Rathore, Shailendra;Ryu, Jung Hyun;Park, Jin Ho;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1361-1384
    • /
    • 2018
  • Recently, Cyber Physical System (CPS) is one of the core technologies for realizing Internet of Things (IoT). The CPS is a new paradigm that seeks to converge the physical and cyber worlds in which we live. However, the CPS suffers from certain CPS issues that could directly threaten our lives, while the CPS environment, including its various layers, is related to on-the-spot threats, making it necessary to study CPS security. Therefore, a survey-based in-depth understanding of the vulnerabilities, threats, and attacks is required of CPS security and privacy for IoT. In this paper, we analyze security issues, threats, and solutions for IoT-CPS, and evaluate the existing researches. The CPS raises a number challenges through current security markets and security issues. The study also addresses the CPS vulnerabilities and attacks and derives challenges. Finally, we recommend solutions for each system of CPS security threats, and discuss ways of resolving potential future issues.

Analysis of Physical Component Considered for The Development of Smart Card Protection Profile (스마트 카드 보호프로파일 개발을 위하여 고려하여야 하는 물리적 위협 요소 분석)

  • Kim, Tai-Hoon;Kim, Min-Chul;Sung, Yune-Gie;Cho, Kyu-Min;No, Byung-Gyu
    • Proceedings of the KIEE Conference
    • /
    • /
    • pp.2747-2749
    • /
    • 2003
  • Security is concerned with the protection of assets from threats, where threats are categorised as the potential for abuse of protected assets. All categories of threats should be considered, but in the domain of security greater attention is given to those threats that are related to malicious or other human activities ISO/IEC 15408 requires the TOE(Target of Evaluation) Security Environment section of a Protection Profile(PP) or Security Target(ST) to contain a list of threats about the TOE security environment or the intended usage of the TOE. This paper presents a specific physical threats should be considered in the smart card PP which developers of smart card PP must consider.

  • PDF

A Study of WiMAX Security threats and Their Solution

  • Woo, Seon-mi;Jeong, Gisung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.66-74
    • /
    • 2016
  • In this study, we have discussed and illustrated the security issues of WiMAX technology including vulnerabilities, threats and some security solution. Both physical layer and data link layer have been considered. Jamming is a major threat in physical layer, and in data link layer we study an authentication problem and see the problem of some unencrypted messages leading to lack of confidentiality. Some of these vulnerabilities have been solved in the recent amendment of 802.16 and some still remain. Moreover WiMax is a new technology yet.

On Physical Security Threat Breakdown Structure for Data Center Physical Security Level Up (데이터센터 물리 보안 수준 향상을 위한 물리보안 위협 분할도(PS-TBS)개발 연구)

  • Bae, Chun-sock;Goh, Sung-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.439-449
    • /
    • 2019
  • The development of information technology represented by ICBMA (IoT, Cloud, Big Data, Mobile, AI), is leading to a surge in data and a numerical and quantitative increase in data centers to accommodate it. As the data center is recognized as a social infrastructure, It is very important to identify physical security threats in advance in order to secure safety, such as responding to a terrorist attack. In this paper, we develop physical security threat breakdown structure (PS-TBS) for easy identification and classification of threats, and verify the feasibility and effectiveness of the PS-TBS through expert questionnaires. In addition, we intend to contribute to the improvement of physical security level by practical use in detailed definition on items of PS-TBS.

A Survey on Nurses' Experience of Verbal and Physical Violence in Small and Medium-sized Hospitals (일개 중소병원 간호사가 경험한 언어적, 신체적 폭력 사건 실태)

  • Kang, Ae Jeong;Lee, Mi Suk;Jeon, Mi Yang
    • Journal of muscle and joint health
    • /
    • v.25 no.2
    • /
    • pp.84-91
    • /
    • 2018
  • Purpose: The purpose of this study was to identify the types of violence experienced by small and medium sized hospital nurses. Methods: Data were collected from March 1 to 30, 2017, using self-report questionnaires. Responses from 87 nurses were analyzed using descriptive statistics, $x^2$ test, Fisher's exact test, t-test. Results: The majority of the respondents experienced violence from patients (60.2%), visitors (25.5%), doctors (12.2%), and other staffs (2.0%). Verbal violence (80.5%) and physical threats (74.7%) were more frequent than physical violence (25.3%). Violence occurred throughout the hospital. However, verbal violence ($x^2=20.85$, p=.005) and physical threat ($x^2=20.80$, p=.006) were statistically significant according to the department. Violence occurred most frequently in surgical ward, followed by artificial kidney room, emergency room, and outpatient department. Conclusion: Most nurses are exposed to frequent violence. These results suggest that hospital should improve the respective organizational cultures and develop promotional programs and administrative policies to prevent violence. Also, hospitals should develop of violence intervention policies and education programs and counseling programs for nurses.

Determinants of Consumer Satisfaction in Fast Food Industry of Lahore Pakistan

  • Ali, Asma;Lee, Jong-In
    • Journal of the Korean Society of Food Culture
    • /
    • v.34 no.4
    • /
    • pp.424-431
    • /
    • 2019
  • The purpose of this study is to analyze and evaluate the key success factors for the fast food industry in the region of Lahore Pakistan. Fast food concept developed very speedily in the last few years in Lahore region. The success or failure of a fast food industry based on some factors like Physical environment, Brand-name, Food quality, Price, Taste, Promotional activity, Habitual consumption, Health threats, Consumer expectation, and Family meal. To identify which of these factors has a greater influence on consumer satisfaction, four fast food restaurants such as McDonald's, PIZZA HUT, KFC, and subway were targeted randomly. The proposed research is quantitative in nature and for data collection; a random sampling technique was used. A questionnaire survey answered by 273 people was considered in this research. Data have been analyzed through statistical techniques. It is observed that Brand name, Food quality, Physical environment, Health threats, Price, Family meals, Habitual consumption, and Consumer expectation showed significant impacts on Fast food industry compared to other factors evaluated herein.

Methodology of Cyber Security Assessment in the Smart Grid

  • Woo, Pil Sung;Kim, Balho H.
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.495-501
    • /
    • 2017
  • The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. In other words, The Energy Management System (EMS) and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. In this study, the optimal power flow (OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.

Strategies Building Knowledge_Base to Respond Effectively to Advanced Cyber Threats (고도화된 사이버 위협에 효과적으로 대응하기 위한 Knowledge_Base 구축전략)

  • Lee, Tae-Young;Park, Dong-Gue
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.357-368
    • /
    • 2013
  • Our society has evolved into a fully connected society in a mixed reality environment enabling various knowledge sharing / management / control / creation due to the expansion of broadband ICT infrastructure, smart devices, cloud services and social media services. Therefore cyber threats have increased with the convenience. The society of the future can cause more complex and subtle problems, if you do not have an effective response to cyber threats, due to fusion of logical space and physical space, organic connection of the smart object and the universalization of fully connected society. In this paper, we propose the strategy to build knowledge-base as the basis to actively respond to new cyber threats caused by future various environmental changes and the universalization of fully connected society.

A Study on the Application of Block Chain Ethereum Technology to Activate Digital Contents Trading as Sharing economy - data encryption and modify merkle tree-

  • Min, Youn-a;Baek, Yeong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.10
    • /
    • pp.73-80
    • /
    • 2018
  • The shared economy began with the concept of sharing the physical and intellectual assets of individuals with others. Nowadays, the concept of shared economy is becoming one of the industries as an enterprise type. Especially, with the development of the Internet and smart devices, various forms of shared economy have been developed in accordance with the need of sharing of individual income. Digital content is also a shareable commodity and it is seeking to utilize it as an item of shared economy. Accordingly, when digital contents are used as a shared economy, there are various possible threats -security threats that may arise in the course of transactions, potential for theft, alteration and hacking of contents. In this paper, we propose transaction method and content protection method using block chain-ethereum technology to reduce security threats and transparent transactions that can occur in digital contents transactions. Through the proposed method, the trust of the consumer and the supplier can be measured and the encryption can be performed considering the characteristics of the data to be traded. Through this paper, it is possible to increase the transparency of smart transaction of digital contents and to reduce the risk of content distortion, hacking, etc.